Disclosure of Invention
The invention aims to provide a security situation prediction method and a security situation prediction system based on an MES identification data intercommunication system, which can accurately position security holes in the MES identification data intercommunication system and realize security situation evaluation in the system, thereby helping security management personnel to make an effective protection scheme.
In order to achieve the purpose, the invention provides the following scheme:
a security situation prediction method based on an MES identification data intercommunication system comprises the following steps:
acquiring a security situation evaluation model of the MES identification data intercommunication system; the safety situation evaluation model is an integral framework of an MES identification data intercommunication system; the safety situation assessment model is respectively a root node layer, a top level node layer, a second level node layer and an enterprise node layer from top to bottom;
extracting network security situation elements of each enterprise node in the enterprise node layer according to the security situation evaluation model; the network security situation elements comprise: original alarm information and original flow data;
determining a situation threat value of each enterprise node according to the network security situation elements;
according to the security situation assessment model, performing data fusion on the situation threat value of each enterprise node by adopting a strategy of fusion from bottom to top and layer to obtain an overall situation threat value of the MES identification data intercommunication system;
determining a global situation threat prediction value according to the global situation threat value in a set date and the autoregressive moving average model; the set date is 30 days.
Optionally, the determining a situation threat value of each enterprise node according to the network security situation element specifically includes:
preprocessing the original alarm information; the preprocessing comprises data normalization and data clustering;
determining the proportion of the occurrence frequency of each attack type to the total occurrence frequency of the attacks according to the preprocessed original alarm information;
determining the threat level of each attack type by adopting a vulnerability scoring system according to the proportion of the occurrence frequency of each attack type to the total occurrence frequency of the attacks;
performing feature extraction on the original flow data to obtain features of the original flow data;
judging whether the original flow data is abnormal or not by utilizing a convolutional neural network according to the characteristics of the original flow data; if the original flow data is abnormal, the flow data is saved as a Boolean value 1, and if the original flow data is normal, the flow data is saved as a Boolean value 0; the convolutional neural network takes the characteristics of the original flow data as input and takes a judgment result as output; the judgment result is that the original flow data is normal or the original flow data is abnormal;
counting the number of hosts with abnormal original flow data;
and determining the situation threat value of each enterprise node according to the threat level of each attack type and the number of corresponding abnormal hosts of the original flow data.
Optionally, the performing data fusion on the situation threat value of each enterprise node by using a strategy of fusion from bottom to top and layer to layer according to the security situation assessment model to obtain the overall situation threat value of the MES identification data interworking system specifically includes:
acquiring the weight of each enterprise node;
performing data fusion on the situation threat values of all enterprise nodes corresponding to each secondary node in the secondary node layer according to corresponding weights to obtain the situation threat values of all nodes in the secondary node layer;
performing data fusion on the situation threat values of all secondary nodes corresponding to each top level node in the top level node layer to obtain the situation threat value of each top level node;
performing data fusion on the situation threat value of each top-level node to obtain the situation threat value of the root node layer; and the situation threat value of the root node layer is the whole situation threat value of the MES identification data intercommunication system.
Optionally, the determining a predicted value of the overall situation threat according to the overall situation threat value within the set date and the autoregressive moving average model further includes:
and feeding back the overall situation threat prediction value.
A security posture prediction system based on an MES identification data interworking system, comprising:
the security situation assessment model acquisition module is used for acquiring a security situation assessment model of the MES identification data intercommunication system; the safety situation evaluation model is an integral framework of an MES identification data intercommunication system; the safety situation assessment model is respectively a root node layer, a top level node layer, a second level node layer and an enterprise node layer from top to bottom;
the network security situation element determining module is used for extracting the network security situation elements of each enterprise node in the enterprise node layer according to the security situation evaluation model; the network security situation elements comprise: original alarm information and original flow data;
the situation threat value determining module is used for determining the situation threat value of each enterprise node according to the network security situation elements;
the overall situation threat value determining module is used for performing data fusion on the situation threat value of each enterprise node by adopting a strategy of fusion from bottom to top and layer to layer according to the security situation assessment model to obtain the overall situation threat value of the MES identification data intercommunication system;
the overall situation threat prediction value determining module is used for determining an overall situation threat prediction value according to the overall situation threat value in a set date and the autoregressive moving average model; the set date is 30 days.
Optionally, the situation threat value determining module specifically includes:
the preprocessing unit is used for preprocessing the original alarm information; the preprocessing comprises data normalization and data clustering;
the attack proportion determining unit is used for determining the proportion of the occurrence frequency of each attack type to the total number of attack occurrences according to the preprocessed original alarm information;
the threat level determining unit is used for determining the threat level of each attack type by adopting a vulnerability scoring system according to the proportion of the occurrence frequency of each attack type to the total occurrence frequency of the attacks;
the characteristic extraction unit is used for extracting the characteristics of the original flow data to obtain the characteristics of the original flow data;
the original flow data judging unit is used for judging whether the original flow data are abnormal or not by utilizing a convolutional neural network according to the characteristics of the original flow data; if the original flow data is abnormal, the flow data is saved as a Boolean value 1, and if the original flow data is normal, the flow data is saved as a Boolean value 0; the convolutional neural network takes the characteristics of the original flow data as input and takes a judgment result as output; the judgment result is that the original flow data is normal or the original flow data is abnormal;
the abnormal statistic unit is used for counting the number of abnormal hosts of the original flow data;
and the situation threat value determining unit is used for determining the situation threat value of each enterprise node according to the threat level of each attack type and the number of corresponding abnormal hosts of the original flow data.
Optionally, the overall situation threat value determining module specifically includes:
the weight acquisition unit of the enterprise node is used for acquiring the weight of each enterprise node;
the situation threat value determination unit of each node of the secondary node layer is used for performing data fusion on the situation threat values of all enterprise nodes corresponding to each secondary node in the secondary node layer according to corresponding weights to obtain the situation threat values of each node of the secondary node layer;
the situation threat value determination unit of the top level node is used for carrying out data fusion on the situation threat values of all the secondary nodes corresponding to each top level node in the top level node layer to obtain the situation threat value of each top level node;
the overall situation threat value determining unit is used for carrying out data fusion on the situation threat value of each top-level node to obtain a situation threat value of the root node layer; and the situation threat value of the root node layer is the whole situation threat value of the MES identification data intercommunication system.
Optionally, the method further includes:
and the feedback module is used for feeding back the overall situation threat prediction value.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects:
according to the security situation prediction method and system based on the MES identification data intercommunication system, the situation threat value of each enterprise node is determined according to the network security situation elements, the security holes in the system are accurately positioned, the security situation in the system is evaluated, and therefore security management personnel are helped to make an effective protection scheme. And performing data fusion on the situation threat value of each enterprise node by adopting a strategy of fusion from bottom to top and layer to layer according to the security situation assessment model to obtain the overall situation threat value of the MES identification data intercommunication system. And the safety situation assessment of a plurality of enterprise nodes is realized at the same time, and the safety situation assessment speed of the whole MES identification data intercommunication system is accelerated.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention aims to provide a security situation prediction method and a security situation prediction system based on an MES identification data intercommunication system, which can accurately position security holes in the MES identification data intercommunication system and realize security situation evaluation in the system, thereby helping security management personnel to make an effective protection scheme.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Fig. 1 is a schematic flow diagram of a security situation prediction method based on an MES identification data interworking system according to the present invention, fig. 2 is a schematic structural diagram of a security situation prediction method based on an MES identification data interworking system according to the present invention, and as shown in fig. 1 and fig. 2, a security situation prediction method based on an MES identification data interworking system includes:
s101, acquiring a security situation evaluation model of the MES identification data intercommunication system; the safety situation evaluation model is an integral framework of an MES identification data intercommunication system; the safety situation assessment model comprises a root node layer, a top level node layer, a second level node layer and an enterprise node layer from top to bottom.
S102, extracting network security situation elements of each enterprise node in the enterprise node layer according to the security situation evaluation model; the network security situation elements comprise: original alarm information and original flow data. The original alarm information is alarm information prompted by a safety protection system (such as a firewall or an intrusion detection system) existing in the MES system.
S103, determining the situation threat value of each enterprise node according to the network security situation elements.
S103 specifically comprises the following steps:
preprocessing the original alarm information; the preprocessing includes data normalization and data clustering.
And (4) carrying out normalization processing on the alarm information generated in the MES system of each enterprise by adopting a natural language processing method.
And inputting the normalized alarm information data by adopting a decision tree algorithm, gathering the data of the same attack type into one class, and finally outputting a plurality of data classes of different attack types.
And determining the proportion of the occurrence frequency of each attack type to the total occurrence frequency of the attacks according to the preprocessed original alarm information.
And determining the threat level of each attack type by adopting a vulnerability scoring system according to the proportion of the occurrence frequency of each attack type to the total occurrence frequency of the attacks.
And performing feature extraction on the original flow data to obtain the features of the original flow data. Specifically, an extraction tool CICFlowMeter is used for extracting features. The CIC-IDS-2018 intrusion detection data set trains the convolutional neural network.
Judging whether the original flow data is abnormal or not by utilizing a convolutional neural network according to the characteristics of the original flow data; if the original flow data is abnormal, the flow data is saved as a Boolean value 1, and if the original flow data is normal, the flow data is saved as a Boolean value 0; the convolutional neural network takes the characteristics of the original flow data as input and takes a judgment result as output; and the judgment result is that the original flow data is normal or the original flow data is abnormal.
And counting the number of abnormal hosts in the original flow data.
And determining the situation threat value of each enterprise node according to the threat level of each attack type and the number of corresponding abnormal hosts of the original flow data.
As a specific embodiment, determining a situation threat value of each enterprise node according to the network security situation element specifically includes:
step 1: collecting original alarm information: collecting original alarm information in an MES system of an enterprise node, wherein the original alarm information is alarm information prompted by a security protection system (such as a firewall or an intrusion detection system) existing in the MES system. Since the alarm information generated by different safety protection systems may be different, all the collected alarm information needs to be normalized. The information normalization processing process comprises the following steps: and 5 characteristic words are output by taking original alarm information generated in the system as input content and adopting a natural language processing method.
Defining the normalized alarm information format as xi={Type,SIP,SPort,DIP,DPort}。
Wherein i represents the serial number of the alarm information, Type represents the attack Type, SIP represents the IP of an intruder, SPort represents the port used by the intruder, DIP represents the IP of important sensitive data under attack, and DPort represents the port of important sensitive data under attack.
Step 2: alarm information clustering: the normalized alarm information may be divided into different data types according to attack types, so that data of the same attack type needs to be gathered into one type, and a plurality of data types of different attack types are generated. In the classification algorithm, the decision tree algorithm has the advantages of high speed and high accuracy, and in order to meet the real-time accuracy of safety protection, the decision tree method is adopted in the method for clustering the normalized alarm information.
And step 3: acquiring original flow data: the method comprises the steps of collecting flow information generated by each host in an enterprise node MES system in real time within one day by using a flow monitor in the system, taking the collected flow information as original data, extracting flow characteristics by using a flow characteristic extraction tool CICFlowMeter, and determining whether the flow is abnormal or not after outputting the flow information by a convolutional neural network (in the method, a CIC-IDS-2018 intrusion detection data set is used for training the convolutional neural network). If the flow data is abnormal, the flow data is saved as a boolean value 1, and if the flow data is normal, the flow data is saved as a boolean value 0.
And 4, step 4: single enterprise node network security posture assessment
And 5: defining P as a certain attack classThe number of pattern occurrences is a ratio of the number of occurrences of all attack types. And collecting clustered system alarm information generated in each day by taking the day as a time cycle. Counting the total times A of attack occurrence and the times B of attack types in the system
i. And then calculating the proportion P of the times of the certain attack type to the total times of the attack. The formula is as follows:
step 6: r is defined as the attack threat level. In the method, a CVSS (common vulnerability assessment system) is adopted to assess the attack threat level, and R is used for representing the threat degree of a certain attack type. The final score for the attack type is 10 max and 0 min. The loopholes with the scores of 7-10 are generally considered to be serious, the loopholes with the scores of 4-6.9 are middle-level loopholes, and the loopholes with the scores of 0-3.9 are low-level loopholes.
And 7: define N as an abnormal traffic condition. The abnormal flow condition in an MES system of a certain enterprise node in each day is counted, and the statistical formula is as follows:
f is the abnormal traffic condition in the MES system of the enterprise node. f is the abnormal traffic condition of each host in the MES system. When f is 0, the flow is normal; when f is 1, the flow rate is abnormal. n represents the number of hosts in the MES system.
And 8: and fusing safety situation elements. Fusing the security situation elements to obtain the threat degree e of a certain attack to an enterprise MES system in one day, and quantifying the threat degree as follows: e ═ P × R + F. The larger the value of e, the higher the threat level the MES system is exposed to.
As a specific embodiment, the security posture elements are fused to obtain a threat level e of a certain attack to an enterprise MES system in one day, and the threat level is quantized as: e ═ P × R + F. The larger the value of e, the higher the threat level the MES system is exposed to.
And S104, performing data fusion on the situation threat value of each enterprise node by adopting a bottom-to-top and layer-by-layer fusion strategy according to the security situation assessment model to obtain an overall situation threat value of the MES identification data intercommunication system.
S104, the weight of each enterprise node is obtained.
And performing data fusion on the situation threat values of all enterprise nodes corresponding to each secondary node in the secondary node layer according to the corresponding weights to obtain the situation threat values of all nodes in the secondary node layer.
And performing data fusion on the situation threat values of all secondary nodes corresponding to each top level node in the top level node layer to obtain the situation threat value of each top level node.
Performing data fusion on the situation threat value of each top-level node to obtain the situation threat value of the root node layer; and the situation threat value of the root node layer is the whole situation threat value of the MES identification data intercommunication system.
S105, determining a predicted value of the overall situation threat according to the overall situation threat value in a set date and the autoregressive moving average model; the set date is 30 days.
Finally, the threat degree e of an enterprise MES system is accumulated by each attack type, so that the security situation of the enterprise MES system in one day can be obtained and is expressed as follows:
e represents the security posture of the enterprise node MES system, E represents the threat level of a single attack to an enterprise MES system, and n represents the number of all attack types.
And (5) counting the network security situation of the whole system. And fusing the network security situation of the MES system of each enterprise node by setting the weight of the network security situation of each enterprise node to obtain the network security situation of each secondary node, and repeating the steps to obtain the network security situation of the whole system. The calculation formula is

S represents the network security situation of each upper node obtained after data fusion, G represents the network security situation of each node of the layer, and n represents the number of all nodes of the layer to which a certain upper node belongs. For example, in the process of obtaining the network security situation of each node in the second node layer by performing data fusion on the network security situation of each node in the enterprise node layer, the network security situation E of each node in the enterprise layer is used as the network security situation G of each node in the local layer, and the network security situation of each node in the second node layer obtained after the data fusion is the network security situation S of each node in the upper layer in the formula. And finally, mastering the network security situation value of the whole system in one day through upward fusion layer by layer.
In order to help the security manager comprehensively grasp the security posture of the system and make a corresponding coping strategy according to the security posture, S105 further includes:
and feeding back the overall situation threat prediction value.
Fig. 4 is a schematic structural diagram of a security situation prediction system based on an MES identification data interworking system provided by the present invention, and as shown in fig. 4, the security situation prediction system based on the MES identification data interworking system provided by the present invention includes: the system comprises a security situation assessment model obtaining module 401, a network security situation element determining module 402, a situation threat value determining module 403, an overall situation threat value determining module 404 and an overall situation threat prediction value determining module 405.
The security situation assessment model acquisition module 401 is configured to acquire a security situation assessment model of the MES identification data interworking system; the safety situation evaluation model is an integral framework of an MES identification data intercommunication system; the safety situation assessment model comprises a root node layer, a top level node layer, a second level node layer and an enterprise node layer from top to bottom.
The network security situation element determining module 402 is configured to extract a network security situation element of each enterprise node in the enterprise node layer according to the security situation evaluation model; the network security situation elements comprise: original alarm information and original flow data.
The situation threat value determination module 403 is configured to determine a situation threat value of each enterprise node according to the network security situation elements.
The overall situation threat value determining module 404 is configured to perform data fusion on the situation threat value of each enterprise node according to the security situation assessment model by using a bottom-to-top and layer-by-layer fusion strategy, so as to obtain an overall situation threat value of the MES identification data interworking system.
The overall situation threat prediction value determination module 405 is configured to determine an overall situation threat prediction value according to the overall situation threat value within a set date and the autoregressive moving average model; the set date is 30 days.
The situation threat value determination module 403 specifically includes: the system comprises a preprocessing unit, an attack proportion determining unit, a threat level determining unit, a feature extracting unit, an original flow data judging unit, an abnormal statistical unit and a situation threat value determining unit.
The preprocessing unit is used for preprocessing the original alarm information; the preprocessing includes data normalization and data clustering.
And the attack proportion determining unit is used for determining the proportion of the occurrence frequency of each attack type to the total number of attack occurrences according to the preprocessed original alarm information.
And the threat level determining unit is used for determining the threat level of each attack type by adopting a vulnerability scoring system according to the proportion of the occurrence frequency of each attack type to the total occurrence frequency of the attacks.
The characteristic extraction unit is used for extracting the characteristics of the original flow data to obtain the characteristics of the original flow data.
The original flow data judging unit is used for judging whether the original flow data are abnormal or not by utilizing a convolutional neural network according to the characteristics of the original flow data; if the original flow data is abnormal, the flow data is saved as a Boolean value 1, and if the original flow data is normal, the flow data is saved as a Boolean value 0; the convolutional neural network takes the characteristics of the original flow data as input and takes a judgment result as output; and the judgment result is that the original flow data is normal or the original flow data is abnormal.
The abnormal statistic unit is used for counting the number of abnormal hosts of the original flow data.
And the situation threat value determining unit is used for determining the situation threat value of each enterprise node according to the threat level of each attack type and the number of corresponding abnormal hosts of the original flow data.
The overall situation threat value determining module 404 specifically includes: the system comprises a weight obtaining unit of an enterprise node, a situation threat value determining unit of each node of a second-level node layer, a situation threat value determining unit of a top-level node and an overall situation threat value determining unit.
The weight acquiring unit of the enterprise node is used for acquiring the weight of each enterprise node.
And the situation threat value determination unit of each node of the secondary node layer is used for performing data fusion on the situation threat values of all enterprise nodes corresponding to each secondary node in the secondary node layer according to the corresponding weights to obtain the situation threat values of each node of the secondary node layer.
And the situation threat value determination unit of the top level node is used for performing data fusion on the situation threat values of all the secondary nodes corresponding to each top level node in the top level node layer to obtain the situation threat value of each top level node.
The overall situation threat value determining unit is used for carrying out data fusion on the situation threat value of each top-level node to obtain a situation threat value of the root node layer; and the situation threat value of the root node layer is the whole situation threat value of the MES identification data intercommunication system.
In order to help security management personnel to comprehensively master the security situation of the system and make corresponding coping strategies, the security situation prediction system based on the MES identification data intercommunication system provided by the invention further comprises: and a feedback module.
And the feedback module is used for feeding back the overall situation threat prediction value.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the system disclosed by the embodiment, the description is relatively simple because the system corresponds to the method disclosed by the embodiment, and the relevant points can be referred to the method part for description.
The principles and embodiments of the present invention have been described herein using specific examples, which are provided only to help understand the method and the core concept of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed. In view of the above, the present disclosure should not be construed as limiting the invention.